Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey

S Kumar, D Moolchandani, SR Sarangi - Journal of Systems Architecture, 2022 - Elsevier
Today, a vast amount of sensitive data worth millions of dollars is processed in untrusted
data centers; hence, the confidentiality and integrity of the code and data are of paramount …

An in-depth survey of bypassing buffer overflow mitigation techniques

MA Butt, Z Ajmal, ZI Khan, M Idrees, Y Javed - Applied Sciences, 2022 - mdpi.com
Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three
decades, potentially compromising any software application or system. This vulnerability …

Memory Integrity Techniques for Memory-Unsafe Languages: A Survey

VE Moghadam, G Serra, F Aromolo, G Buttazzo… - IEEE …, 2024 - ieeexplore.ieee.org
The complexity of modern software systems, the integration of several software components,
and the increasing exposure to public networks make systems more susceptible to cyber …

DROPSYS: Detection of ROP attacks using system information

SK Kim, H Jin, K Joo, J Lee, DH Lee - Computers & Security, 2024 - Elsevier
As modern return-oriented programming (ROP) attacks have become more sophisticated,
preventing or detecting these attacks is essential for real-world exploit defense. As an …

Control-flow integrity at risc: Attacking risc-v by jump-oriented programming

O Gilles, F Viguier, N Kosmatov, DG Pérez - arXiv preprint arXiv …, 2022 - arxiv.org
RISC-V is an open instruction set architecture recently developed for embedded real-time
systems. To achieve a lasting security on these systems and design efficient …

InversOS: Efficient Control-Flow Protection for AArch64 Applications with Privilege Inversion

Z Shen, J Criswell - arXiv preprint arXiv:2304.08717, 2023 - arxiv.org
With the increasing popularity of AArch64 processors in general-purpose computing,
securing software running on AArch64 systems against control-flow hijacking attacks has …

[PDF][PDF] 'X-RIPE: A modern cross-platform runtime intrusion prevention evaluator

G Serra, S Di Leonardi, A Biondi - The 15th Annual Workshop …, 2022 - sra.uni-hannover.de
The complexity of modern software systems, the integration of several software components,
and the increasing exposure to public networks are making systems more and more …

Generic Tagging for RISC-V Binaries

D Demicco, M Cole, G Yuksek, RT Gollapudi… - arXiv preprint arXiv …, 2022 - arxiv.org
With the widespread popularity of RISC-V--an open-source ISA--custom hardware security
solutions targeting specific defense needs are gaining popularity. These solutions often …

R5Detect: Detecting Control-Flow Attacks from Standard RISC-V Enclaves

D Bove, L Panzer - arXiv preprint arXiv:2404.03771, 2024 - arxiv.org
Embedded and Internet-of-Things (IoT) devices are ubiquitous today, and the uprising of
several botnets based on them (eg, Mirai, Ripple20) raises issues about the security of such …

A Fault Attack Resistant Method for RISC-V Based on Interrupt Handlers and Instruction Extensions

J Wei, Q Liu - 2024 IEEE International Symposium on Circuits …, 2024 - ieeexplore.ieee.org
This paper proposes an anti-fault injection attack method for data flow errors of RISC-V
processor, which occur when the processor is under fault attacks with clock glitches. To …